Video Screencast Help
Symantec Analyst Relations
Showing posts tagged with General Symantec
Showing posts in English
Caroline Dennington | 23 Jul 2014 | 0 comments

The recent visit of several industry analysts in Symantec's UK office created the perfect opportunity to provide insights into Symantec's Unified Information Management Strategy and the Information Fabric Platform that underpins this strategy.

Paul Dominjon, Symantec's Senior Product Marketing Manager, pointed out that customers are moving increasingly to a virtual environment, while many business-critical applications remain on physical servers. At the same time, our customers often have operations that have grown through mergers and acquisitions with up to two to three backup solutions in play and little or no integration. “The upshot of this is that customers are simply too busy to rationalize, consolidate and simplify their technology and licenses,” said Dominjon.

Whatever the customer infrastructure, Symantec's role is to support our customers and the wider business community through our redefined Unified Information Management Strategy, delivering a platform...

Drew Meyer | 17 Jul 2014 | 0 comments

Symantec’s unified vision and new array of solutions around its Information Management (IM) offering are propelling customers towards ever greater agility, freedom of choice and the highest levels of security in what is becoming an increasingly complex and disparate IT environment for organizations everywhere.

That was the good news we were able to deliver at a recent webinar for the APJ region where industry analysts gathered to hear how environments spanning both physical and virtual can be better managed using our IM solutions. What we were able to tell everyone was exactly how we are now able to reduce those complexity issues they face every day, supporting our customers as they perform crucial functions around archiving, data protection and backup, and data recovery.

In a world where the move into the cloud is accelerating – public, private and hybrid –customers want to leverage all the advantages this may offer by having the flexibility of running any operating...

Sian John | 15 Jul 2014 | 0 comments

An ongoing debate is about the location of antivirus - whether it should happen within a virtual machine or outside of it, in the management/hypervisor layer.
 
This question becomes increasingly important when considering software-defined networking (SDN) or more specifically, what happens as the creation of virtual machines becomes increasingly automated?
 
As use of SDN increases, so it becomes more important to ensure all security features are enabled - such as intrusion protection, firewall and behavioural monitoring - not just antivirus.
 
This is primarily because it may not always be obvious how and where a VM is to be used, and therefore how well protected it needs to be. However it is not so straightforward to run some features 'off-VM' - for example behavioural monitoring requires direct access to system resources.
 
Equally there are times when it makes more sense to run...

fbunn | 17 Jun 2014 | 0 comments

While Communications Service Providers (CSPs) tell their customers they are more than ‘simply' network utilities, it stands to reason that they need to provide similar levels of service to traditional utility companies such as water or energy providers. 

In security terms this means offering a certain level of information protection - as has been said more than once, just as we expect water to come out of our pipes clean, so we expect the same for our information. 

This doesn’t mean that the onus is entirely on the CSP, of course. Across the history of end-point security, providers and software vendors have had to work together to help protect the confidentiality, integrity and availability of data whether it is at rest on a PC, or in transit across the network. 

More recently, the rise of mobile computing has seen handsets start simple and become increasingly complex, meaning that consumers are not always well prepared against...

fbunn | 21 May 2014 | 0 comments

An interesting finding from the Internet Security Threat Report we issued last month concerns companies with 1-2,500 employees - variously grouped as the Small to Medium Business (SMB) sector - who are seeing the largest increase in targeted attacks. These attacks have already increased by 91% year on year; in addition, whereas 50% were aimed at SMBs in 2012, by 2013 the number had increased to 61%.

The clear suggestion - confirmed by other research we have done - is that the creators of such attacks are becoming smarter in terms of understanding how to profit from targeted attacks. As a result they are focusing less on bigger enterprises and more on smaller and mid-size companies, which often have less security countermeasures in place. 

This begs the question - where are such organisations going to get help, and...

Paul Wood | 08 Apr 2014 | 0 comments

In security as in business, information is power. As we put together the latest edition of the Internet Security Threat Report, we wanted to do more than simply throw some figures out there. As a result, Volume 19 presents a comprehensive analysis of last year’s threats according to publicly available information and events within Symantec’s purview, as well as detailed guidance about what security professionals can do in response. 

At the top level of the report, the main finding was a rapid and significant increase in breaches leading to the exposure of individual identities - employee, customer and patient details. Overall a total of 552 million identities were exposed, across 253 significant security breaches. 

Just as significantly, many of these breaches took place in the final quarter of the year, suggesting that we are at the beginning of a slew of such attacks - one of the reasons we felt pressed to include detailed advice in...

tgrandpre | 17 Mar 2014 | 0 comments

Mobile World Congress was an exciting time for Symantec this year, with so much constructive engagement taking place with many of you from the analyst community, particularly around the key areas of Mobile Device Management (MDM), Mobile Application Management (MAM), Mobile Security and Enterprise File Synchronization and Sharing (EFSS).

From my conversations with you, what really seemed to catch your attention were the advances we’ve been making in mobile as a whole. The overall integration between MDM and MAM – and broader solutions that enhance our mobile offerings – many of you agreed were taking things in a new direction.

Most of you seemed more than familiar with Norton Zone already, but it might be worth a quick recap here. Norton Zone is our secure sync and file technology – a personal cloud service that lets users safely share files from your computer, smartphone and tablet. Many of our...

Sian John | 26 Feb 2014 | 0 comments

It can often seem that security measures exist to stop people from doing things, or to try to catch them out if they do. Across organisations, an broadening range of mechanisms can be used to ensure staff are not breaking the rules - raising the increasingly important question - how can security needs be balanced with employee privacy?

The answer is not straightforward. All manner of techniques are available to system administrators, security managers or senior management, including Data Leakage Prevention (DLP) and Deep Packet Inspection, but also extending to simply using privileges to gain access to the content of employee emails.

Not only is the potential for abuse clear and present but also, the corporate environment is becoming more complicated. A person's smartphone may connect to the corporate guest LAN - does this make it fair game for monitoring? What about use of  location information or CCTV, to help process efficiency or monitor for...

FranRosch | 24 Feb 2014 | 0 comments

One of the central challenges of what has been termed 'consumerization' is how to balance the benefits experienced by employees using their own devices and applications, with the inherent risks to the business of doing so. The bottom line is one of cost - while employees may be more productive as a result, working more efficiently and delivering results faster, if something goes wrong the business may be left out of pocket. 

The risks are real. Consider the simple example of someone accessing corporate email on a personal device, against the fact that 60% of mobile device users don't have a pin code. Given that smartphones and tablets are frequent targets for theft, it seems only a matter of time before internal corporate communications, intellectual property, even customer data could end up in the wrong hands.

At the same time, mobile access to data and services really does make people more productive. Even if it were possible, a ban on smart devices...

msmart007 | 13 Feb 2014 | 0 comments

Virtualisation brings enormous benefits to organisations everywhere, fundamentally altering the way in which they do business. It’s not a new concept, of course, but we are now seeing it being applied across areas that go way beyond simply machines and hosts.

Let’s look first at the virtualised world itself and its adoption among organisations: Enterprises are now operating at around 50-55% virtualisation in their data centres, with the goal of taking that to 90% or even higher. It’s a huge opportunity and a massive challenge, especially when it comes to security; because security has always struggled to keep up in the virtualised environment.

Generally speaking, there is a ‘tax’ to be paid when you put security into such an environment and usually that tax relates to performance – everything tends to run much slower. The upshot is that you no longer have the capacity you want and need – which runs counter to the whole point of having virtualisation in the first place...